SlideShare a Scribd company logo
MALWARE AND ITS TYPES
MUHAMMAD DANIYAL QURESHI
COMPUTER SCIENCE
SHAH ABDUL LATIF UNIVERSITY
+923337178801
MALWARE
'Malware' is an umbrella term used to refer to a
variety of forms of hostile or intrusive software,
including computer viruses, worms, Trojan horses,
ransomware, spyware, adware, scareware, and
other malicious programs. It can take the form of
executable code, scripts, active content, and other
software
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
The least dangerous and
most lucrative Malware.
Adware displays ads on your
computer.
TYPES
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
It is software that spies on you,
tracking your internet activities in
order to send advertising (Adware)
back to your system.
TYPES
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
A virus is a contagious program or code
that attaches itself to another piece of
software, and then reproduces itself when
that software is run. Most often this is
spread by sharing software or files between
computers.
TYPES
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
A program that replicates itself and
destroys data and files on the
computer. Worms work to “eat” the
system operating files and data files
until the drive is empty.
TYPES
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
The most dangerous Malware. Trojans are written with
the purpose of discovering your financial information,
taking over your computer’s system resources, and in
larger systems creating a “denial-of-service attack ”
Denial-of-service attack: an attempt to make a machine
or network resource unavailable to those attempting to
reach it. Example: AOL, Yahoo or your business network
becoming unavailable.
TYPES
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
Backdoors are much the same as Trojans or
worms, except that they open a “backdoor”
onto a computer, providing a network
connection for hackers or other Malware to
enter or for viruses or SPAM to be sent.
TYPES
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
Records everything you type on your PC in order
to glean your log-in names, passwords, and other
sensitive information, and send it on to the
source of the keylogging program. Many times
keyloggers are used by corporations and parents
to acquire computer usage information.
TYPES
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
This one deceives or misleads users. It pretends
to be a good program to remove Malware
infections, but all the while it is the Malware.
Often it will turn off the real Anti-Virus software.
The next image shows the typical screen for this
Malware program, Antivirus 2010
TYPES
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
If you see this screen that warns you that you have been locked
out of your computer until you pay for your cybercrimes. Your
system is severely infected with a form of Malware called
Ransomware. It is not a real notification from the FBI, but, rather
an infection of the system itself. Even if you pay to unlock the
system, the system is unlocked, but you are not free of it locking
you out again. The request for money, usually in the hundreds of
dollars is completely fake.
TYPES
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
When your homepage changes to one that looks like those in the
images inserted next, you may have been infected with one form
or another of a Browser Hijacker. This dangerous Malware will
redirect your normal search activity and give you the results the
developers want you to see. Its intention is to make money off
your web surfing. Using this homepage and not removing the
Malware lets the source developers capture your surfing interests.
This is especially dangerous when banking or shopping online.
These homepages can look harmless, but in every case they allow
other more infectious.
TYPES
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
TYPES
This one is likened to the burglar hiding in the attic,
waiting to take from you while you are not home. It is
the hardest of all Malware to detect and therefore to
remove; many experts recommend completely wiping
your hard drive and reinstalling everything from scratch.
It is designed to permit the other information gathering
Malware in to get the identity information from your
computer without you realizing anything is going on.
ADWARE SPYWARE VIRUS WORMS TROJAN
BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE
RANSOMWARE BROWSER HIJACKER ROOTKITS
THANK YOU FOR YOUR
CONCENTRATION
IF YOU HAVE ANY QUESTION, PLEASE ASK !

More Related Content

What's hot

Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
Rob Ragan
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Malware ppt
Malware pptMalware ppt
Malware ppt
Faiz Khan
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Internet Security
Internet SecurityInternet Security
Internet Security
Mitesh Gupta
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
EILLEN IVY PORTUGUEZ
 
Virus
VirusVirus
Virus
Protik Roy
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
Hamza Muhammad
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
Apurv Singh Gautam
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 

What's hot (20)

Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Web Security
Web SecurityWeb Security
Web Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Virus
VirusVirus
Virus
 
Computer security
Computer securityComputer security
Computer security
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 

Viewers also liked

PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
karanwayne
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Cyber crime’s
Cyber crime’sCyber crime’s
Cyber crime’s
Reeshabh Chaudhary
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
Malwares
MalwaresMalwares
Malwares
Claire Medolla
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Pragnesh Ghoda
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
Stavia
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
Krishnakant Mishra
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
hibaehed
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
anthnyq
 
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Digiday
 
Malware
MalwareMalware
Malware
fovi96
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware Sanyog Chandra
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
jackadision
 
Study Skills, Notetaking and Technology
Study Skills, Notetaking and TechnologyStudy Skills, Notetaking and Technology
Study Skills, Notetaking and Technology
aaberra
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
OPSWAT
 

Viewers also liked (20)

PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Malware
MalwareMalware
Malware
 
Cyber crime’s
Cyber crime’sCyber crime’s
Cyber crime’s
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malwares
MalwaresMalwares
Malwares
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
Know Your Malware: Protect Yourself @ DPS Europe, 2/4/15
 
Malware
MalwareMalware
Malware
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
 
Study Skills, Notetaking and Technology
Study Skills, Notetaking and TechnologyStudy Skills, Notetaking and Technology
Study Skills, Notetaking and Technology
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 

Similar to MALWARE AND ITS TYPES

Malware, Trojans and Slurpware
Malware, Trojans and  SlurpwareMalware, Trojans and  Slurpware
Malware, Trojans and Slurpware
Varun Arora
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
ITrust - Cybersecurity as a Service
 
How To Identify Popular Spyware
How To Identify Popular SpywareHow To Identify Popular Spyware
How To Identify Popular Spyware
Sysvoot Antivirus
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
jeffautor15
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
missstevenson01
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
Kakai Catalan
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
EC-Council
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
Lokesh Bysani
 
Ransomware
RansomwareRansomware
Ransomware
Akshita Pillai
 
athira m s.pptx
athira m s.pptxathira m s.pptx
athira m s.pptx
ATHIRAMS25
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
actanimation
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
Ammar Hasayen
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
NamanKikani
 
Securing Your Future: cybersecurity course in kerala
Securing Your Future: cybersecurity course in keralaSecuring Your Future: cybersecurity course in kerala
Securing Your Future: cybersecurity course in kerala
offensoSEOwork
 
a direction to randsomware and more, with Insights
a direction to randsomware and more, with Insightsa direction to randsomware and more, with Insights
a direction to randsomware and more, with Insights
alonelonamaria
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
Gaurav Dalvi
 

Similar to MALWARE AND ITS TYPES (20)

Malware, Trojans and Slurpware
Malware, Trojans and  SlurpwareMalware, Trojans and  Slurpware
Malware, Trojans and Slurpware
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
MALWARE
MALWAREMALWARE
MALWARE
 
The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
 
How To Identify Popular Spyware
How To Identify Popular SpywareHow To Identify Popular Spyware
How To Identify Popular Spyware
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Ransomware
RansomwareRansomware
Ransomware
 
athira m s.pptx
athira m s.pptxathira m s.pptx
athira m s.pptx
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Securing Your Future: cybersecurity course in kerala
Securing Your Future: cybersecurity course in keralaSecuring Your Future: cybersecurity course in kerala
Securing Your Future: cybersecurity course in kerala
 
a direction to randsomware and more, with Insights
a direction to randsomware and more, with Insightsa direction to randsomware and more, with Insights
a direction to randsomware and more, with Insights
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 

MALWARE AND ITS TYPES

  • 1. MALWARE AND ITS TYPES MUHAMMAD DANIYAL QURESHI COMPUTER SCIENCE SHAH ABDUL LATIF UNIVERSITY +923337178801
  • 2. MALWARE 'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 3. The least dangerous and most lucrative Malware. Adware displays ads on your computer. TYPES ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 4. It is software that spies on you, tracking your internet activities in order to send advertising (Adware) back to your system. TYPES ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 5. A virus is a contagious program or code that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers. TYPES ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 6. A program that replicates itself and destroys data and files on the computer. Worms work to “eat” the system operating files and data files until the drive is empty. TYPES ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 7. The most dangerous Malware. Trojans are written with the purpose of discovering your financial information, taking over your computer’s system resources, and in larger systems creating a “denial-of-service attack ” Denial-of-service attack: an attempt to make a machine or network resource unavailable to those attempting to reach it. Example: AOL, Yahoo or your business network becoming unavailable. TYPES ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 8. Backdoors are much the same as Trojans or worms, except that they open a “backdoor” onto a computer, providing a network connection for hackers or other Malware to enter or for viruses or SPAM to be sent. TYPES ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 9. Records everything you type on your PC in order to glean your log-in names, passwords, and other sensitive information, and send it on to the source of the keylogging program. Many times keyloggers are used by corporations and parents to acquire computer usage information. TYPES ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 10. This one deceives or misleads users. It pretends to be a good program to remove Malware infections, but all the while it is the Malware. Often it will turn off the real Anti-Virus software. The next image shows the typical screen for this Malware program, Antivirus 2010 TYPES ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 11. If you see this screen that warns you that you have been locked out of your computer until you pay for your cybercrimes. Your system is severely infected with a form of Malware called Ransomware. It is not a real notification from the FBI, but, rather an infection of the system itself. Even if you pay to unlock the system, the system is unlocked, but you are not free of it locking you out again. The request for money, usually in the hundreds of dollars is completely fake. TYPES ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 12. When your homepage changes to one that looks like those in the images inserted next, you may have been infected with one form or another of a Browser Hijacker. This dangerous Malware will redirect your normal search activity and give you the results the developers want you to see. Its intention is to make money off your web surfing. Using this homepage and not removing the Malware lets the source developers capture your surfing interests. This is especially dangerous when banking or shopping online. These homepages can look harmless, but in every case they allow other more infectious. TYPES ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 13. TYPES This one is likened to the burglar hiding in the attic, waiting to take from you while you are not home. It is the hardest of all Malware to detect and therefore to remove; many experts recommend completely wiping your hard drive and reinstalling everything from scratch. It is designed to permit the other information gathering Malware in to get the identity information from your computer without you realizing anything is going on. ADWARE SPYWARE VIRUS WORMS TROJAN BACKDOORS KEYLOGGER ROGUE CITY SOFTWARE RANSOMWARE BROWSER HIJACKER ROOTKITS
  • 14. THANK YOU FOR YOUR CONCENTRATION IF YOU HAVE ANY QUESTION, PLEASE ASK !